Skip to main content

AcLGB: A Lightweight DDoS Attack Detection Method

  • Conference paper
  • First Online:
The 7th International Conference on Information Science, Communication and Computing (ISCC2023 2023)

Part of the book series: Smart Innovation, Systems and Technologies ((SIST,volume 350))

  • 132 Accesses

Abstract

With the development of Internet technology, distributed denial of service(DDoS) attack has always been a hot and difficult point in network security.Protecting network infrastructure and information security is also becoming more and more important.However, cyber security is an arms race, as attacks develop and network traffic surges, intelligent solutions face the challenge of detecting sensitive changes in traffic characteristics.In this paper, we propose a lightweight Adaptive Clustering-based LightGBM(AcLGB) detection method.This is a new DDoS traffic classification method and an effective lightweight detection method.We introduce a new clustering technique to learn the clustering centers that can be used to extend the characteristics of a given dataset.It solves the challenge of difficult detection when traffic characteristics change sensitively.The model separates the samples of different categories in the best way, and outperforms the current detection method with 99.98% detection accuracy. In the CIC-DDoS2019 data set, the detection time of 802s is better than other detection methods.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 249.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. “NexusGuard” [online] Available: https://www.netscout.com/

  2. “CIC-DDoS2019” [online] Available: https://www.unb.ca/cic/datasets/ddos-2019.html

  3. Yu, Y., Long, J., Cai, Z.: Session-based network intrusion detection using a deep learning architecture. In: International Conference on Modeling Decisions for Artificial Intelligence, pp. 144–155 (2017)

    Google Scholar 

  4. Yu, Y., Long, J., Cai, Z.: Network intrusion detection through stacking dilated convolutional autoencoders. In: Security and Communication Networks, pp. 1–10 (2017)

    Google Scholar 

  5. Yousefi-Azar, M., Varadharajan, V., Hamey, L., Tupakula, U.: Autoencoder-based feature learning for cyber security applications. In: IEEE International Joint Conference on Neural Networks, pp. 3854–3861 (2017)

    Google Scholar 

  6. Tan, Z., Jamdagni, A., He, X., Nanda, P., Liu, R., Hu, J.: Detection of denial-of-service attacks based on computer vision techniques. IEEE Trans. Comput. 64(9), 2519–2533 (2014)

    Google Scholar 

  7. Wang, W., Sheng, Y., Wang, J., Zeng, X., Ye, X., Huang, Y., et al.: HAST-IDS: Learning Hierarchical Spatial-Temporal Features using Deep Neural Networks to Improve Intrusion Detection (2017)

    Google Scholar 

  8. Min, E., Long, J., Liu, Q., Cui, J., Chen, W.: TR-IDS: anomaly-based intrusion detection through text-convolutional neural network and random forest. In: Security and Communication Networks, pp. 1–9 (2018)

    Google Scholar 

  9. Dong, S., Sarem, M.: DDoS attack detection method based on improved KNN with the degree of DDoS attack in software-defined networks. 8, 5039–5048 (2018)

    Google Scholar 

  10. Li, Y., Xia, J., Zhang, S., et al.: An efficient intrusion detection system based on support vector machines and gradually feature removal method. Expert Syst. Appl. 39(1), 424–430 (2012)

    Article  MathSciNet  Google Scholar 

  11. Cui, J., Zhang, Y., Cai, Z., Liu, A., Li, Y.: Secure-display path for security-sensitive applications on mobile. Comput. Mater. Continua 55(1), 17–35 (2018)

    Google Scholar 

  12. de Assis, M.V.O., Carvalho, L.F., Rodrigues, J.J.P.C., et al.: Near real-time security system applied to SDN environments in IoT networks using convolutional neural network. Comput. Electr. Eng. 86, 106738 (2020)

    Google Scholar 

  13. Javaid, A., Niyaz, Q., Sun, W., et al.: A deep learning approach for network intrusion detection system. Eai Endorsed Trans. Secur. Saf. 3(9), 2 (2016)

    Google Scholar 

  14. Sadaf, K., Sultana, J.: Intrusion detection based on autoencoder and isolation Forest in fog computing. 8, 167059–167068 (2020)

    Google Scholar 

  15. Wei, Y., Jang-Jaccard, J., Sabrina, F., et al.: AE-MLP: a hybrid deep learning approach for DDoS detection and classification. IEEE 9, 146810–146821 (2021)

    Google Scholar 

  16. “PyTorch”, [online] Available: https://pytorch.org/

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jieren Cheng .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Zeng, F., Cheng, J., Cao, Z., Yang, Y., Sheng, V.S. (2024). AcLGB: A Lightweight DDoS Attack Detection Method. In: Qiu, X., Xiao, Y., Wu, Z., Zhang, Y., Tian, Y., Liu, B. (eds) The 7th International Conference on Information Science, Communication and Computing. ISCC2023 2023. Smart Innovation, Systems and Technologies, vol 350. Springer, Singapore. https://doi.org/10.1007/978-981-99-7161-9_16

Download citation

  • DOI: https://doi.org/10.1007/978-981-99-7161-9_16

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-99-7160-2

  • Online ISBN: 978-981-99-7161-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics